Impact Factor

The following problem may occur in real world scenario: A data distributor has given sensitive data to a set of trusted agents (third parties or third persons).It may happen that some of the data is leaked and found in an unauthorized place (e.g.; on the web or unauthorized persons laptop). The distributor must assess the probability of specified outcome that the leaked data came from one or more agents. In this paper; we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data. By adding fake objects to distributed set; the distributor can find the guilty party.